From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Divers are counting them: Squid gather and mate with as many partners as possible, then die, in an annual ritual off Rapid Head on the Fleurieu Peninsula, south...Bruce Schneier From Schneier on Security | November 20, 2015 at 05:30 PM
Reputation is a social mechanism by which we come to trust one another, in all aspects of our society. I see it as a security mechanism. The promise and threat...Bruce Schneier From Schneier on Security | November 20, 2015 at 08:04 AM
They're for carrying cash through dangerous territory: SDR Traveller caters to people who, for one reason or another, need to haul huge amounts of cash money through...Bruce Schneier From Schneier on Security | November 19, 2015 at 07:16 AM
That is, no encryption at all. The Intercept has the story: "Yet news emerging from Paris -- as well as evidence from a Belgian ISIS raid in January -- suggests...Bruce Schneier From Schneier on Security | November 18, 2015 at 04:35 PM
This is creepy and disturbing: Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track...Bruce Schneier From Schneier on Security | November 18, 2015 at 07:59 AM
I have avoided writing about the Cybersecurity Information Sharing Act (CISA), largely because the details kept changing. (For those not following closely, similar...Bruce Schneier From Schneier on Security | November 17, 2015 at 01:03 PM
Paul Krugman has written a really good update of my 2006 esssay. Krugman: So what can we say about how to respond to terrorism? Before the atrocities in Paris,...Bruce Schneier From Schneier on Security | November 17, 2015 at 07:36 AM
Well, that didn't take long: As Paris reels from terrorist attacks that have claimed at least 128 lives, fierce blame for the carnage is being directed toward American...Bruce Schneier From Schneier on Security | November 16, 2015 at 03:39 PM
There's pretty strong evidence that the team of researchers from Carnegie Mellon University who canceled their scheduled 2015 Black Hat talk deanonymized Tor users...Bruce Schneier From Schneier on Security | November 16, 2015 at 07:19 AM
Amazon chose Data and Goliath as one of its Best Books of 2015, in both the nonfiction and business categories....Bruce Schneier From Schneier on Security | November 13, 2015 at 03:25 PM
Interesting research: "Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps," by Jinyan Zang, Krysta Dummit...Bruce Schneier From Schneier on Security | November 13, 2015 at 07:08 AM
"Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client," by Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. Abstract...Bruce Schneier From Schneier on Security | November 12, 2015 at 03:28 PM
This is an interesting story. Someone posts a photograph of herself holding a winning horse-race betting ticket, and someone else uses the data from the photograph...Bruce Schneier From Schneier on Security | November 12, 2015 at 08:01 AM
Jobs are plentiful and salaries are booming. I know from personal experience that demand far exceeds supply....Bruce Schneier From Schneier on Security | November 10, 2015 at 03:17 PM
Margaret McFall-Ngai studies the symbiotic relationship between squid and the bacteria that live inside them. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | November 6, 2015 at 05:30 PM